Security Policy
Authentication Settings
SunSystems can be configured to use different authentication methods as explained below, however database security is always based on Windows authentication. Consequently, for any implementation other than a standalone installation, a domain is required, which allows servers and clients to correctly authenticate with the database server.
Uwaga: A SunSystems user is always required before accessing SunSystems functions, and all internal security access constraints are based on this account.
Authentication Method | Features |
---|---|
Standard | Basic level of security. SunSystems Security maintains users and associated passwords. |
Windows | Windows credentials entered during operating system sign-in are passed straight through to SunSystems. These are mapped to a specific SunSystems User to determine the identity of the user submitting the login request. The SunSystems User never sees a login dialogue. |
LDAP complaint Directory Service | An LDAP compliant directory service is used to authenticate login request. These are mapped to a specific SunSystems User to determine the identity of the login requesterSunSystems |
It is possible to mix the authentication methods described above. If a Windows mapping is found, this will always take precedence.